A8 and A3: Cross-Site Attacks

OWASP    |    Intermediate
  • 12 videos | 46m 23s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 439 users Rating 4.5 of 439 users (439)
OWASP Top 10 list items 8 and 3 include cross-site attacks, which are very common exploits in modern web applications

WHAT YOU WILL LEARN

  • Explain what cross-site request forgery (csrf) is
    Exploit csrf and what kind of access is needed to exploit it
    Detect csrf and how common they are
    List technical and business impacts of csrfs
    Provide examples of csrf attacks
    Describe what cross-site scripting (xss) is
  • Exploit xss and what kind of access is needed to exploit it
    Detect xss and how common it is
    List the technical and business impacts of xss
    Provide examples of xss attacks
    Review an xss attack
    Describe how csrf and xss can be exploited by an attacker

IN THIS COURSE

  • 4m 57s
    After completing this video, you will be able to explain what Cross-site Request Forgery (CSRF) is. FREE ACCESS
  • 6m 2s
    Learn how to exploit CSRF and what access is needed to exploit it. FREE ACCESS
  • Locked
    3.  A8 - CSRF Detection
    3m 41s
    In this video, you will learn about CSRF attacks and how common they are. FREE ACCESS
  • Locked
    4.  A8 - CSRF Impacts
    3m 14s
    After completing this video, you will be able to list the technical and business impacts of CSRFs. FREE ACCESS
  • Locked
    5.  A8 - CSRF Attacks
    4m 56s
    After completing this video, you will be able to provide examples of CSRF attacks. FREE ACCESS
  • Locked
    6.  A3 - Cross-site Scripting (XSS)
    2m 51s
    Upon completion of this video, you will be able to describe what Cross-site Scripting is. FREE ACCESS
  • Locked
    7.  A3 - XSS Exploits
    3m 12s
    In this video, you will learn how to exploit XSS and what kind of access is needed to exploit it. FREE ACCESS
  • Locked
    8.  A3 - XSS Detection
    3m 47s
    In this video, you will learn about XSS and how common it is. FREE ACCESS
  • Locked
    9.  A3 - XSS Impacts
    2m 29s
    Upon completion of this video, you will be able to list the technical and business impacts of cross-site scripting. FREE ACCESS
  • Locked
    10.  A3 - XSS Attacks
    3m 44s
    After completing this video, you will be able to provide examples of XSS attacks. FREE ACCESS
  • Locked
    11.  A3 - Reviewing XSS Attacks
    3m 38s
    In this video, learn how to review an XSS attack. FREE ACCESS
  • Locked
    12.  Exercise: Exploit CSRF and XSS
    3m 55s
    After completing this video, you will be able to describe how CSRF and XSS can be used by an attacker. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 2 users Rating 4.5 of 2 users (2)
Rating 4.6 of 239 users Rating 4.6 of 239 users (239)
Rating 4.6 of 196 users Rating 4.6 of 196 users (196)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 354 users Rating 4.5 of 354 users (354)
Rating 4.5 of 121 users Rating 4.5 of 121 users (121)
Rating 4.5 of 27188 users Rating 4.5 of 27188 users (27188)